C2PA inspector
Shows what software made an image and how it was edited — when JPEG or PNG carries C2PA / Content Credentials.
Reads C2PA Content Credentials from JPEG and PNG and shows what made the file (Photoshop, Firefly, Midjourney, a Sony camera, etc.), what actions the manifest recorded (cropped, retouched, AI-generated), what ingredient assets it references. C2PA is a cross-industry provenance standard (Adobe, Microsoft, BBC, NYT, Sony, Leica). It is especially relevant in the AI-generation era: ChatGPT, DALL-E, Firefly already write C2PA marks into their output, so the signature lets you machine-distinguish “made by a neural net” from “shot on a camera”. Technically C2PA data is stored as JUMBF (ISO/IEC 19566-5): a hierarchy of boxes spliced together from multiple APP11 markers in JPEG, or from a caBX chunk in PNG. The tool walks the full JUMBF tree, extracts every JSON payload (claim, assertions, ingredients) and renders them in a readable view; the raw manifest is one click away. Honest caveat: this views the signature payload, it does not cryptographically verify it. Trust the claim only when the issuing key is in the C2PA Trust List. Processing happens in the browser, the file never leaves your device.